General
-
Target
b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87
-
Size
855KB
-
Sample
230216-xmfddsbb98
-
MD5
c0f1be41ef253acfe0c45555261ec0b6
-
SHA1
1bab831ebe65c65c38bc35d1dd2da825de50a4e2
-
SHA256
b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87
-
SHA512
6ffc51d37675c90160abca9a4084a8fd4189b442b92612d75785512ea5ddccefbbdcfff8c54fb5e72a1873b8b1506839a73cfe401f04a5d4145efc050a3659ef
-
SSDEEP
12288:aMr2y90qJ0sgCwHiWHrOb5tP2XR1gk9SGG4S8W6nPu7tqSQOwU4EnVKhR3S:Uyf01lCQrgvPkjZSF6nPUqzOSEnVKW
Static task
static1
Behavioral task
behavioral1
Sample
b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87
-
Size
855KB
-
MD5
c0f1be41ef253acfe0c45555261ec0b6
-
SHA1
1bab831ebe65c65c38bc35d1dd2da825de50a4e2
-
SHA256
b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87
-
SHA512
6ffc51d37675c90160abca9a4084a8fd4189b442b92612d75785512ea5ddccefbbdcfff8c54fb5e72a1873b8b1506839a73cfe401f04a5d4145efc050a3659ef
-
SSDEEP
12288:aMr2y90qJ0sgCwHiWHrOb5tP2XR1gk9SGG4S8W6nPu7tqSQOwU4EnVKhR3S:Uyf01lCQrgvPkjZSF6nPUqzOSEnVKW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-